Accepted Posters
The following posters will be presented at the USENIX Security ’17 Poster Session and Happy Hour on Thursday, August 17, from 6:00 pm–7:30 pm in the Pavilion Ballroom and Foyer.
Cyber Security Strategy Wargame
Andreas Haggman, Royal Holloway University of London
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, and Linus Gasser, École polytechnique fédérale de Lausanne (EPFL); Ismail Khoffi, University of Bonn; Justin Cappos, New York University; Bryan Ford, École polytechnique fédérale de Lausanne (EPFL)
A penny for your password
Hazel Murray and David Malone, Maynooth University
STM/PE and XHIM
Eugene D. Myers, National Security Agency
Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves
Ofir Weisse, Valeria Bertacco, and Todd Austin, University of Michigan
Decentralized Certificate Authorities
Hannah Li, Bargav Jayaraman, and David Evans, University of Virginia
Ransomware based on hardware trojans. Forget the typical Ransomware, you should start worrying about hardware
Honorio Martin, Department of Electronics Technology, Universidad Carlos III de Madrid; Pedro Peris-Lopez, Department of Computer Science, Universidad Carlos III de Madrid; Luis Entrena, Department of Electronics Technology, Universidad Carlos III de Madrid; Giorgio Di Natale, LIRMM, Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier
ECG Dj: Heart Beat Synchronization
Lara Ortiz-Martin and Pedro Peris-Lopez, Dept. of Computer Science. Carlos III University of Madrid; Pablo Picazo-Sanchez and Gerardo Schneider, Dept. of Computer Science and Engineering. Chalmers | Gothenburg University; Juan Tapiador, Dept. of Computer Science. Carlos III University of Madrid
TRIDEnT: Trustworthy collaboRative Intrusion DETection
Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natália Réka Ivánkó, Tamara Frieß, and Max Mühlhäuser, TU Darmstadt
What if Hardware is Untrusted? A Study of the Hardware Double Fetch Problem in Linux Kernel
Kai Lu, Pengfei Wang, Gen Li, and Xu Zhou, National University of Defense Technology
EvadeML-Zoo: A Benchmarking and Visualization Tool for Adversarial Machine Learning
Weilin Xu, Andrew Norton, Noah Kim, Yanjun Qi, and David Evans, University of Virginia
On the use of first-hand sensorial data for user and context continuous authentication in smartphones
Jose Maria de Fuentes, Lorena Gonzalez-Manzano, and Arturo Ribagorda, Carlos III University of Madrid (Spain)
JSPolicy: Policied Sandboxes for Untrusted Third-Party JavaScript
Ethan Lowman and David Evans, University of Virginia
Exposing Falsified Data Attacks on CV-based Traffic Signal Control
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, and Henry X. Liu, University of Michigan
Ulrera!: Securing Ultrasonic Sensor based on Signal Relation and Randomness
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee, Korea University
Dial 258x: play your app on your speakers to get the malware family
Guillermo Izquierdo-Moreno, Pedro Peris-Lopez, and Carmen Camara, Department of Computer Science, Carlos III University of Madrid
Cookie Theft Attacks in HTTPS by Invalidating Cookie Flags
Hyunjae Nam, Hyunsoo Kwon, Hyungjun Shin, Jongmin Jeong, Changhee Hahn, and Junbeom Hur, Korea University
Hold The Door!: RF Fingerprint extraction in keyless entry system
Kyungho Joo, Wonsuk Choi, and Dong Hoon Lee, Korea University
KleeFL - Seeding Fuzzers With Symbolic Execution
Julian Fietkau and Bhargava Shastry, TU Berlin
Deobfuscation of Virtualization-based Obfuscated Binary
Mingyue Liang and Zhoujun Li, Beihang University; Qiang Zeng, Temple University; Zhejun Fang, CNCERT/CC
Dynamic Policy-Based Access Control for Emerging IoT Systems
Mehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, and Andre Ivanov, University of British Columbia, Vancouver, Canada
Estimating Vulnerability Scores To Augment Enterprise Security Systems
Hassan Halawa, Matei Ripeanu, and Konstantin Beznosov, University of British Columbia; Alex Loffler, Telus
Approaches to Evading Windows PE Malware Classifiers
Anant Kharkar, Helen Simecek, Weilin Xu, and David Evans, University of Virginia; Hyrum S. Anderson, Endgame
Cyber Assurance Assessment Using Systems and Control Theory
Georgios Bakirtzis, Electrical & Computer Engineering, Virginia Commonwealth University; Bryan Carter, Systems & Information Engineering, University of Virginia; Carl R. Elks, Electrical & Computer Engineering, Virginia Commonwealth University; Cody H. Fleming, Systems & Information Engineering, University of Virginia
Image Processing based Phishing Detection Framework
Hyunsang Choi and Sanghyun Cho, Naver Corporation; Young-Gab Kim, Sejong University